Bug 74717 (CVE-2005-0103) - VUL-0: CVE-2005-0103: missed squirrelmail fixes
Summary: VUL-0: CVE-2005-0103: missed squirrelmail fixes
Status: RESOLVED FIXED
Alias: CVE-2005-0103
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other All
: P5 - None : Normal
Target Milestone: ---
Assignee: Ludwig Nussel
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2005-0103: CVSS v2 Base Score: 7....
Keywords:
Depends on:
Blocks:
 
Reported: 2005-03-29 14:44 UTC by Ludwig Nussel
Modified: 2021-10-27 16:01 UTC (History)
1 user (show)

See Also:
Found By: Other
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Ludwig Nussel 2005-03-29 14:44:32 UTC
We received the following report via bugtraq.
The issue is public.

Looks like we missed these:

Date: Fri, 28 Jan 2005 23:09:03 -0600 (CST)
From: Jonathan Angliss <jon@squirrelmail.org>
To: bugtraq@securityfocus.com
Cc: security@squirrelmail.org
Subject: SquirrelMail Security Advisory

SquirrelMail Security Advisory
==============================

SquirrelMail 1.4.4 has been released to resolve a number of security
issues disclosed below.  It is strongly recommended that all running
SquirrelMail prior to 1.4.4 upgrade to the latest release.

Remote File Inclusion
---------------------
Manoel Zaninetti reported an issue in src/webmail.php which would allow a
crafted URL to include a remote web page.  This was assigned CAN-2005-0103
by the Common Vulnerabilities and Exposures.

Cross Site Scripting Issues
---------------------------
A possible cross site scripting issue exists in src/webmail.php that is
only accessible when the PHP installation is running with register_globals
set to On.  This issue was uncovered internally by the SquirrelMail
Development team. This isssue was assigned CAN-2005-0104 by the Common
Vulnerabilities and Exposures.

A second issue which was resolved in the 1.4.4-rc1 release was uncovered
and assigned CAN-2004-1036 by the Common Vulnerabilities and Exposures. 
This issue could allow a remote user to send a specially crafted header
and cause execution of script (such as javascript) in the client browser.

Local File Inclusion
--------------------
A possible local file inclusion issue was uncovered by one of our
developers involving custom preference handlers.  This issue is only
active if the PHP installation is running with register_globals set to On.


It is strongly suggested that all users running SquirrelMail prior to
1.4.4 upgrade to the latest release.  Those using a development release,
should upgrade to the latest snapshots to ensure they have the latest
updates for these issues.  A full list of changes in this, and previous
releases can be found here (http://www.squirrelmail.org/changelog.php).

For further updates on security issues, details are posted to
http://www.squirrelmail.org/security/.  Any security issues should be
emailed to security@squirrelmail.org.

We'd like to express thanks for those that have worked with us on getting
security issues resolved with SquirrelMail, and hope that people continue
to do so in such fashion, it is much appreciated.

-- 
Jonathan Angliss
SquirrelMail Development Team
Comment 1 Ludwig Nussel 2005-04-25 08:20:05 UTC
ping 
Comment 2 Marian Jancar 2005-04-27 08:22:41 UTC
submited 
Comment 3 Ludwig Nussel 2005-04-29 09:48:07 UTC
You submitted a package for 9.2 only. However I assume all other distributions  
are affected as well!? 
Comment 4 Ludwig Nussel 2005-04-29 09:54:49 UTC
SM-Tracker-1094 
Comment 5 Ludwig Nussel 2005-05-09 11:38:15 UTC
Marian? 
Comment 6 Marian Jancar 2005-05-09 11:46:45 UTC
I will return to this when I'm done with sles9-sp2 fixes.
Comment 7 Ludwig Nussel 2005-05-09 11:55:21 UTC
ok 
Comment 8 Marian Jancar 2005-05-12 18:19:35 UTC
fixes submited
Comment 9 Michael Schröder 2005-05-18 12:27:05 UTC
Where's the 8.2 submission? 
Comment 10 Michael Schröder 2005-05-30 19:30:22 UTC
Ping? 
Comment 11 Marian Jancar 2005-05-31 11:45:37 UTC
only 1.4.x are affected, there is 1.2.10 in 8.2
Comment 12 Ludwig Nussel 2005-06-02 07:21:07 UTC
updates released  
Comment 13 Ludwig Nussel 2005-06-02 07:21:24 UTC
. 
Comment 14 Thomas Biege 2009-10-13 21:14:38 UTC
CVE-2005-0103: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)